UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000) audit: type=1800 audit(1670691991.783:2): pid=7980 uid=0 auid=4294967295 ses=4294967295 op="collect_data" cause="failed(directio)" comm="syz-executor391" name="bus" dev="loop0" ino=1357 res=0 ================================================================== BUG: KASAN: use-after-free in udf_close_lvid.isra.0+0x5a1/0x630 fs/udf/super.c:2044 Write of size 1 at addr ffff88809bb13868 by task syz-executor391/7980 CPU: 0 PID: 7980 Comm: syz-executor391 Not tainted 4.14.301-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x281 lib/dump_stack.c:58 print_address_description.cold+0x54/0x1d3 mm/kasan/report.c:252 kasan_report_error.cold+0x8a/0x191 mm/kasan/report.c:351 kasan_report mm/kasan/report.c:409 [inline] __asan_report_store1_noabort+0x68/0x70 mm/kasan/report.c:432 udf_close_lvid.isra.0+0x5a1/0x630 fs/udf/super.c:2044 udf_put_super+0x211/0x2a0 fs/udf/super.c:2354 generic_shutdown_super+0x144/0x370 fs/super.c:446 kill_block_super+0x95/0xe0 fs/super.c:1161 deactivate_locked_super+0x6c/0xd0 fs/super.c:319 deactivate_super+0x7f/0xa0 fs/super.c:350 cleanup_mnt+0x186/0x2c0 fs/namespace.c:1183 task_work_run+0x11f/0x190 kernel/task_work.c:113 exit_task_work include/linux/task_work.h:22 [inline] do_exit+0xa44/0x2850 kernel/exit.c:868 do_group_exit+0x100/0x2e0 kernel/exit.c:965 SYSC_exit_group kernel/exit.c:976 [inline] SyS_exit_group+0x19/0x20 kernel/exit.c:974 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x5e/0xd3 RIP: 0033:0x7f5dd17e0549 RSP: 002b:00007fff69d535a8 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 RAX: ffffffffffffffda RBX: 00007f5dd1867470 RCX: 00007f5dd17e0549 RDX: 000000000000003c RSI: 00000000000000e7 RDI: 0000000000000001 RBP: 0000000000000001 R08: ffffffffffffffb8 R09: 00007fff69d53628 R10: 000080001d00c0d0 R11: 0000000000000246 R12: 00007f5dd1867470 R13: 0000000000000001 R14: 0000000000000000 R15: 0000000000000001 Allocated by task 1: save_stack mm/kasan/kasan.c:447 [inline] set_track mm/kasan/kasan.c:459 [inline] kasan_kmalloc+0xeb/0x160 mm/kasan/kasan.c:551 kmem_cache_alloc+0x124/0x3c0 mm/slab.c:3552 getname_flags+0xc8/0x550 fs/namei.c:138 do_sys_open+0x1ce/0x410 fs/open.c:1075 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x5e/0xd3 Freed by task 1: save_stack mm/kasan/kasan.c:447 [inline] set_track mm/kasan/kasan.c:459 [inline] kasan_slab_free+0xc3/0x1a0 mm/kasan/kasan.c:524 __cache_free mm/slab.c:3496 [inline] kmem_cache_free+0x7c/0x2b0 mm/slab.c:3758 putname+0xcd/0x110 fs/namei.c:259 do_sys_open+0x203/0x410 fs/open.c:1090 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x5e/0xd3 The buggy address belongs to the object at ffff88809bb12c80 which belongs to the cache names_cache of size 4096 The buggy address is located 3048 bytes inside of 4096-byte region [ffff88809bb12c80, ffff88809bb13c80) The buggy address belongs to the page: page:ffffea00026ec480 count:1 mapcount:0 mapping:ffff88809bb12c80 index:0x0 compound_mapcount: 0 flags: 0xfff00000008100(slab|head) raw: 00fff00000008100 ffff88809bb12c80 0000000000000000 0000000100000001 raw: ffffea00026eefa0 ffffea00026e8020 ffff88823f8c1200 0000000000000000 page dumped because: kasan: bad access detected Memory state around the buggy address: ffff88809bb13700: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ffff88809bb13780: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb >ffff88809bb13800: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ^ ffff88809bb13880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ffff88809bb13900: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ==================================================================